Configuring pxGrid in an ISE Distributed Environment

advertisement
Configuring pxGrid in an ISE Distributed
Environment
SECURE ACCESS HOW-TO GUIDES
Table of Contents
About this Document ...................................................................................................................................................... 4
Introduction ..................................................................................................................................................................... 5
ISE Distributed Deployment with pxGrid persona Introduction .................................................................................. 6
pxGrid persona Configuration ....................................................................................................................................... 8
Configuring Microsoft CA 2008 R2 Enterprise pxGrid Template .......................................................... 8
pxGrid Node Configuration without pxGrid Active-Standby................................................................ 10
CA-Signed Node Certificate Generation ............................................................................................ 10
Exporting pxGrid node public/private key in Primary PAN & MnT node ............................................. 14
Bulk Session Downloads ................................................................................................................... 17
Registering ISE Nodes for Distributed Environment ................................................................................................. 18
pxGrid Client Management ........................................................................................................................................... 20
pxGrid Client Configuration ......................................................................................................................................... 22
pxGrid Java sdk Installation ..................................................................................................................... 22
Introduction to pxGrid client SDK Java Keystores .................................................................................... 23
pxGrid client certificate configuration ....................................................................................................... 24
pxGrid client Active-Standby Examples ............................................................................................. 30
Testing pxGrid client in ISE Distributed Environment ............................................................................................... 36
Viewing Keystore Entries ......................................................................................................................... 37
ISE Distributed Deployment with pxGrid Active-Standby Introduction.................................................................... 45
Registering ISE nodes for Distributed Environment pxGrid Active-Standby .......................................................... 46
Testing pxGrid client in ISE Distributed Environment pxGrid Active-Standby ....................................................... 50
Testing pxGrid Active-Standby ................................................................................................................. 51
Basic Operation ................................................................................................................................. 51
Testing FailOver ....................................................................................................................................... 54
Returning Back to Primary ....................................................................................................................... 56
ISE Self-Signed Identity Certificates ........................................................................................................................... 60
Sample Certificates from SDK ..................................................................................................................................... 64
Testing pxGrid Client ................................................................................................................................ 65
References ..................................................................................................................................................................... 67
Appendices .................................................................................................................................................................... 68
Alternative way of generating pxGrid node Certificate Signing Request (CSR) ....................................... 68
Troubleshooting ....................................................................................................................................... 70
Removing Java and Installing JDK 8.0 on Centos 6.5 ............................................................................. 70
Cisco Systems © 2015
Page 2
SECURE ACCESS HOW-TO GUIDES
Delete Old version of Java ................................................................................................................. 70
Install JDK 8.0.................................................................................................................................... 71
Cisco Systems © 2015
Page 3
SECURE ACCESS HOW-TO GUIDES
About this Document
This document is intended for Cisco engineers, partners, and customers deploying pxGrid in a production Cisco
Identity Services (ISE) 1.3 environment. The reader should familiar with ISE and pxGrid.
This document focuses on deploying external CA Signed Certificates for the ISE pxGrid node and pxGrid clients.
Other certificate deployment considerations such as: self-signed ISE Identity certificates and pxGrid sample
certificates are discussed in detail in the series of following documents: Deploying Certificates with Cisco pxGrid

Certificate Authority (CA)-signed pxGrid ISE node and CA-signed pxGrid client

Certificate Authority (CA)-signed pxGrid client and self-self signed ISE pxGrid node certificate

Self-signed certificates with ISE pxGrid node and pxGrid client
For Configuring pxGrid in a test environment, please see reference:
http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-84Configure_and_Test_Integration_with_Cisco_pxGrid.pdf
This document will cover an external ISE pxGrid node configuration and pxGrid Active-Standby configuration in a
distributed ISE environment. The pxGrid client for testing these configurations is a MacBook Pro running OSX 10.8.5
and Oracle Java Development Kit(jdk-8u-20-macros-x64.dmg) for the pxGrid java SDK. If you are running other
versions of Linux, please see http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-84Configure_and_Test_Integration_with_Cisco_pxGrid.pdf
This document also touches on configuring the pxGrid ISE node with self-signed certificates and sample certificates
used in POC deployments. However for detailed information, please refer to the associated documents.
A Microsoft Enterprise 2008 CA R2 Enterprise server was used for the Certificate Authority (CA) and signed both the
pxGrid client certificate, pxGrid node certificates and ISE node certificates.
Cisco Systems © 2015
Page 4
SECURE ACCESS HOW-TO GUIDES
Introduction
Cisco Platform Exchange Grid (pxGrid) enables multivendor, cross platform network system collaboration among
parts of the IT infrastructure such as security monitoring and network detection systems, network platforms, asset and
configuration management, identity and access management platforms and virtually any other IT operations platform.
When business or operations needs arise, ecosystem partners can use pxGrid to exchange contextual information via a
publish/subscribe method with Cisco platforms that use pxGrid as well as any other ecosystem that uses pxGrid.
There are essentially three components to pxGrid: the publisher, pxGrid client, and the pxGrid controller, Cisco
Identity Service Engine (ISE) pxGrid node.

pxGrid publisher of topics of information, the pxGrid client will subscribe to- In Cisco Identity Services
Engine (ISE) version 1.3, ISE is the sole publisher of this information or capabilities as they called as well.

pxGrid client- can be a supported Cisco Security platform, pxGrid ecosystem partner, or a Linux or MAC host
running the pxGrid SDK, that subscribes to the published information.

pxGrid controller – Cisco Identity Services Engine (ISE) pxGrid node, that controls the client
registration/management and topic/subscription processes.
ISE will publish these information topics:

SessionDirectory- session attributes from authenticated 802.1X sessions

EndpointProtectionService- Adaptive Network Control (ANC) quarantine/unquarantine mitigation actions

TrustsecMetadataCapability- Security Group Tag (SGT) Information

EndpointProfileMetadata- ISE policy information

IdentityGroup- group and profiling information
The pxGrid client will subscribe to these topics and obtain the ISE contextual information.
ISE is deployed in a distributed environment, where all the nodes have separate personas: Primary PAN (Policy Admin
node), Primary MnT (Monitoring) node, PSN (Policy Service Node). The pxGrid node will also be deployed as a
separate persona and will require a customized pxGrid template in a CA (Certificate Authority) signed environment.
This document covers the procedural steps in configuring pxGrid in this ISE distributed environment using CA signed
certificates for both the ISE pxGrid node and the ISE pxGrid client.
This document also covers a pxGrid Active-Standby configuration.
A MAC running OSX 10.8.5 will serve as the pxGrid client in this document.
A Microsoft Enterprise CA (Certificate Authority) 2008 R2 Server, will be the designated CA server. Please note that a
customized template for pxGrid will have an Enhanced KeyUsage (EKU) of both client and server authentication. The
EKU defines the purpose of the certificate, and is defined by the ISO-defined object identifiers (OIDs), in this use case
one for client authentication (1.3.6.1.5.5.7.3.2) and another one for server authentication (1.3.6.1.5.5.7.3.1).
Cisco Systems © 2015
Page 5
SECURE ACCESS HOW-TO GUIDES
ISE Distributed Deployment with pxGrid persona
Introduction
The Windows 2008 R2 Enterprise CA Server was used as the CA Authority. The CA root certificate was imported into
the trusted system certificates store of each of the ISE nodes. The CSR node requests were serviced by the CA using
the web server template and admin “usage” certs defined in the ISE nodes, except for the pxGrid nodes.
The pxGrid nodes use a custom template, containing EKU’s for both client and server authentication.
Note: The pxGrid template can be a duplicate of the user template using Windows 2003 format, and a duplicate of the user template with EKUs for
both client authentication and server authentication added.
The public/private key pair from the pxGrid node must be copied to the system certificate store for each of the Primary
PAN (admin) and Primary MnT (monitoring) modes for successful pxGrid operation.
Note: In the case of an Active-Standby pxGrid configuration, the public/private key pair of the first pxGrid node (primary pxGrid node) will be
exported into the Primary PAN and Primary MnT nodes. The public/private key pair of the second pxGrid node (secondary pxGrid node) will be
exported into the secondary PAN or secondary MnT nodes.
The below diagram represents a typical ISE distributed environment with regards to certificate generation for the
various ISE nodes. Note the admin “usage” certificate for CSR request generation for all ISE nodes except for the
pxGrid node. The CA server will service these requests using the “web server” template. The pxGrid “usage”
certificate for the pxGrid node(s) CSR request is serviced by the custom pxGrid template.
Cisco Systems © 2015
Page 6
SECURE ACCESS HOW-TO GUIDES
The below diagram represents the pxGrid node configuration in a Distributed ISE environment. The pxGrid node is
external in all productional environments.
The public/private key from the pxGrid node is copied into the system certificate stores of both the Primary PAN and
Primary MnT before enabling the pxGrid controller..
Cisco Systems © 2015
Page 7
SECURE ACCESS HOW-TO GUIDES
pxGrid persona Configuration
Configuring Microsoft CA 2008 R2 Enterprise pxGrid Template
This section covers the pxGrid certificate template configuration. The pxGrid template must contain both EKU’s for
client authentication and server authentication.
The pxGrid template is created in the following steps:
Step 1
Select->Administrative Tools->Certificate Authority-> “+” dropdown next to CA server->Right-Click on
Certificate Templates->Manage
Step 2
Right-Click and Duplicate User template->Select->Windows 2003 Enterprise->OK
Note: Select Windows Server 2003 Enterprise so it will appear in the template CA window drop-down
Cisco Systems © 2015
Page 8
SECURE ACCESS HOW-TO GUIDES
Step 3
Enter name of certificate template, uncheck “Publish certificate in Active Directory”, provide validity
period and renewal period.
Step 4
Click on Extensions->Add->Server Authentication->OK->Apply
Cisco Systems © 2015
Page 9
SECURE ACCESS HOW-TO GUIDES
pxGrid Node Configuration without pxGrid Active-Standby
This section illustrates the steps of defining the ISE nodes, generating CSR requests and obtaining certificates from the
CA authority. The process is typical of any ISE distributed deployment. This occurs in stand-alone before joining the
nodes from the Primary Admin node.
The pxGrid node will use the ISE pxGrid usage certificates for the initial CSR requests and serviced by the MS CA
“pxGrid” template as defined earlier. The returned certificate will be bound to the initial pxGrid CSR request.
The public/private key pair will be exported from the pxGrid node and imported into the Primary PAN and Primary
MnT nodes.
Note: In a pxGrid Active-Standby configuration, the public/private key pair from the second or secondary pxGrid node will be imported into the
Secondary PAN and Secondary MnT nodes.
The Microsoft CA root certificate will be downloaded and imported into the trusted system certificates store in each
ISE node and enabled for “Trust for Authentication within ISE”.
CA-Signed Node Certificate Generation
The following steps outline the procedure for downloading the CA root certificate, generating ISE node CSR requests,
and binding certificates to CSR requests.
Note: The CA Root certificate and other serviced certificate requests should be download in base 64 format
Step 1
Download CA root in base 64 format.
Step 2
Import into the Trusted Certificates Store
Cisco Systems © 2015
Page 10
SECURE ACCESS HOW-TO GUIDES
Administration->System->Certificates->Trusted Certificates
Step 3
Generate CSR for the desired Admin, MnT, nodes, in stand-alone environment.
Administration-System->Certificates->Certificate Signing Requests-“admin” certificate usage
Step 4
Use the MS CA “Web Server” template to service the certificate requests for the Admin, MnT, PSN nodes.
Cisco Systems © 2015
Page 11
SECURE ACCESS HOW-TO GUIDES
Step 5
Download in base 64 encoded format
Step 6
Bind the certificate to the CSR requests for each ISE node, individually. (i.e. admin, MnT, PSN)
Administration-System->Certificates->Certificate Signing Requests->Select certificate and Bind
Step 7
Import the node certificate for each ISE node, individually, then submit
Cisco Systems © 2015
Page 12
SECURE ACCESS HOW-TO GUIDES
Step 8
Generate CSR for the pxGrid node.
Administration->System->Certificates->Certificate Signing Requests-“pxGrid” certificate usage
Step 9
Submit request MS CA “pxGrid” template to service certificate request for the pxGrid node.
Cisco Systems © 2015
Page 13
SECURE ACCESS HOW-TO GUIDES
Step 10
Bind the pxGrid certificate to the pxGrid node CSR request.
Administration-System->Certificates->Certificate Signing Requests->Select pxGrid node & bind certificate
Exporting pxGrid node public/private key in Primary PAN & MnT node
There is an alternative way for exporting the primary pxGrid node public/private key pair into the Primary PAN and
Primary MnT node for pxGrid operation, please see: Alternative way of generating pxGrid node CSR (Certificate
Signing Request) in the Appendices.
Cisco Systems © 2015
Page 14
SECURE ACCESS HOW-TO GUIDES
The public/private key pair of the pxGrid client node must be copied into the Primary PAN and MnT node. The steps
are described below:
Step 1
Export the public and private keys from the pxGrid node’s system certificate store and import to the system
store for the desired Primary Admin and MnT nodes in Stand-alone mode new installation.
Note: If you have an existing ISE 1.3 deployment and adding external pxGrid persona, you can export the pubic/private key pairs for the pxGrid
node from the Primary PAN’s system certificates store and import into the Primary PAN and Primary MnT
Administration->System->Certificates->System Certificates, select the certificate and export the certificate
and private key
You will have to provide a name for the private key (i.e. cisco123). This will be saved as a zipped file
containing both the PEM and PVK (public/private key pair).
Step 2
For the desired Primary Admin node, import both public and private key into the System Certificate store,
then submit.
Administration->System->Certificates->System Certificates and import both the pxGrid PEM
and PVK certificates.
Cisco Systems © 2015
Page 15
SECURE ACCESS HOW-TO GUIDES
Step 3
For the desired Primary MnT node, import both public and private key into the System Certificate store,
then submit.
Administration->System->Certificates->System Certificates and import both the pxGrid PEM
and PVK certificates.
Step 4
You will see the pxGrid public/private key in the system certificates store of the Primary PAN and Primary
MnT nodes.
Cisco Systems © 2015
Page 16
SECURE ACCESS HOW-TO GUIDES
Bulk Session Downloads
Bulk Session downloads provide active session download queries from the ISE MnT node, using the pxGrid
session_download script. This provides available session attributes from authenticated 802.1X authenticated sessions
with regards to available ISE contextual information. The public key (PEM) from the MnT node is copied to the
pxGrid client, converted to DER, and imported into the truststoreFilename keystore. This will be covered later, but for
now export the MnT node certificate as indicated below.
Note: In a pxGrid Active Standby Configuration, both the Primary MnT node and the Secondary MnT node certificates need to be imported into the
pxGrid client. If either of these certificates does not exist, there will be problem when registering clients, and non-connectivity to pxGrid nodes.
Step 1
Export the public certificate key only from the desired MnT node. This will be used by the pxGrid client
for bulk session downloads
Administration->Certificates->Certificate Management->System Certificates and select the MnT identity
cert and export the public certificate
Cisco Systems © 2015
Page 17
SECURE ACCESS HOW-TO GUIDES
Registering ISE Nodes for Distributed Environment
The desired stand-alone ISE nodes for Primary PAN, Primary MnT, PSN, and pxGrid are registered through the
Primary Admin (PAN) node.
These steps are defined below:
Step 1
Set the desired Admin node to initially include Primary Admin and Primary MnT personas.
Step 2
Register the desired MnT node which will become the primary MnT.
Note: The Primary PAN will automatically become the secondary MnT persona. Disable the secondary MnT persona.
Step 3
Register the PSN node
Cisco Systems © 2015
Page 18
SECURE ACCESS HOW-TO GUIDES
Step 4
Register the pxGrid node
Step 5
Ensure that the pxGrid services started and you have the ISE published capabilities
Administration->pxGrid Services and also enable Auto Registration
Cisco Systems © 2015
Page 19
SECURE ACCESS HOW-TO GUIDES
pxGrid Client Management
The pxGrid Service menu provides: client management: client registration/deletion, authorization of client “pending”
requests when Auto-Registration is disabled. This menu also provides a log history view of the client registered
capabilities or information topics.
Enable Auto-Registration – enables auto registration, pxGrid clients will automatically register after the initial
pxGrid client authentication has completed.
Disable Auto-Registration – disables auto registration, pxGrid clients will remain in a “pending” state until the
administrator moves them into the appropriate “session” or “EPS” group.
Client Groups- client groups will register primarily to the “session” group for pxGrid operation.
Administrator- reserved for ISE
Session- access to session attribute information
EPS- superset of “session” group, used for ANC “Adaptive Network Control” mitigations
Live Log- displays history of client registration and topic subscriptions
Cisco Systems © 2015
Page 20
SECURE ACCESS HOW-TO GUIDES
Cisco Systems © 2015
Page 21
SECURE ACCESS HOW-TO GUIDES
pxGrid Client Configuration
In this section, we cover the pxGrid java SDK installation for pxGrid sample script testing. Register.sh will be run to
connect and establish connection with the pxGrid controller. Session_download.sh will be run to download active
session records from ISE. These scripts are used for basic testing to ensure that the connection and communication
between the pxGrid client and ISE are working. If you have a desire to test all the shell scripts including Adaptive
Network Control (ANC) mitigation actions, formerly known as Endpoint Protection Service (EPS). Please see:
(http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-84Configure_and_Test_Integration_with_Cisco_pxGrid.pdf)
pxGrid Java sdk Installation
Please see your Cisco Account team for obtaining the pxGrid java SDK libraries
Download the Oracle Java Development Kit for your Linux operating system:
http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html
In order to install the Oracle Java Development Kit, you must uninstall the older version of Java that exists on your
system.
Note: If you are using a MAC for testing, please see: https://www.java.com/en/download/help/mac_uninstall_java.xml for uninstalling Java
If you are using Centos 6.5, please refer to the Appendices Removing Java and Installing JDK 8.0 on Centos 6.5
Untar the folder. tar -zxf pxgrid-sdk-x.x.x-dist.tar.gz
You will see the following:

Lib- contains all the GCL Libraries

Samples- contains bin, certs, conf, lib and src directories

Bin- contains all the sample scripts

Certs- contains all the sample pxGrid identity and rootSample certificates

Src- contains all the java source files
In order to run the pxGrid sample scripts, include the path of jre in the “JAVA_HOME=” environment variable.
An example for the MAC is provided below.
To view the location of the jre path, run the following:
Note: you will need root privileges when running sudo
sudo find / -name java
Password:
/Applications/pxGridsdk/pxgrid-sdk-1.0.0/samples/src/java
find: /dev/fd/3: Not a directory
find: /dev/fd/4: Not a directory
/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Home/bin/java
/Library/Java/JavaVirtualMachines/jdk1.8.0_25.jdk/Contents/Home/bin/java
/Library/Java/JavaVirtualMachines/jdk1.8.0_25.jdk/Contents/Home/jre/bin/java
Cisco Systems © 2015
Page 22
SECURE ACCESS HOW-TO GUIDES
Add the path “/Library/Java/JavaVirtualMachines/jdk1.8.0_25.jdk/Contents/Home/jre” to JAVA_HOME
export JAVA_HOME=/Library/Java/JavaVirtualMachines/jdk1.8.0_25.jdk/Contents/Home/jre
With different versions of Linux, such as Centos 64, make sure “keytool” is included in the path
Append the “../jdk1.7._51/bin” to PATH
export
PATH=/usr/lib64/qt3.3/bin:/usr/local/bin:/usr/bin:/bin:/usr/local/sbin:/usr/sbin:/sbin:/home/jeppich/bin:/usr
/java/jdk1.7.0_51/bin
Introduction to pxGrid client SDK Java Keystores
Java keystores contain the public/private key pairs of certificates, such as the CA root certificates, host identity or
pxGrid client certificate, self-signed certificate. The java keystore itself is a PKCS #12 format (.JKS).
The certificates themselves are either in a PEM or CER format, and converted over to DER and imported into the java
keystore.
In this document, we will use CA signed pxGrid client certificates and CA signed ISE certificates.
For pxGrid, there is the keystoreFilename that contains the pxGrid client identity certificate and truststoreFilename
keystore that represents the CA root certificates, and the MnT node certificates.
In addition these keystore values contains associated passwords, keystorePassword and truststorePassword when
importing the certificates into the keystore.
The keystoreFilename, keystorePassword, truststoreFilename, truststorePassword, are using in the pxGrid SDK scripts
for SASL authentication and connection to the pxGrid persona.
In the illustrated example below, the pxGrid client registers and connects to the pxGrid controller.
./register.sh -keystoreFilename pxGridClient.jks -keystoreFilename cisco123 -truststoreFilename root3.jks truststorePassword cisco123 -group Session -description test -username macbook-pro -hostname 10.0.0.48
------- properties ------version=1.0.0
hostnames=10.0.0.48
username=macbook-pro
descriptipon=test
keystoreFilename=pxGridClient.jks
keystorePassword=cisco123
truststoreFilename=root3.jks
truststorePassword=cisco123
-------------------------registering...
connecting...
account enabled
connected.
done registering.
connection closed
Cisco Systems © 2015
Page 23
SECURE ACCESS HOW-TO GUIDES
In the illustrated example below, the pxGrid client downloads active session records from the MnT node
./session_download.sh -keystoreFilename pxGridClient.jks -keystoreFilename cisco123 -truststoreFilename
root3.jks -truststorePassword cisco123 -username macbook-pro -hostname 10.0.0.48
------- properties ------version=1.0.0
hostnames=10.0.0.48
username=MacBook-Pro
keystoreFilename=pxGridClient.jks
keystorePassword=cisco123
truststoreFilename=root3.jks
truststorePassword=cisco123
filter=null
start=null
end=null
-------------------------connecting...
connected.
starting at Wed Dec 10 18:44:49 EST 2014...
session (ip=10.0.0.18, Audit Session Id=0A0000020000000B006E1086, User Name=jeppich, AD User DNS
Domain=lab6.com, AD Host DNS Domain=null, AD User NetBIOS Name=LAB6, AD Host NETBIOS Name=null, Calling
station id=00:0C:29:D1:8D:90, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint
Profile=VMWare-Device, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/15, RADIUSAVPairs=[ Acct-SessionId=00000002], Posture Status=null, Posture Timestamp=, Session Last Update Time=Wed Dec 10 16:41:48 EST 2014
)... ending at: Wed Dec 10 18:44:49 EST 2014
--------------------------------------------------downloaded 1 sessions in 26 milliseconds
--------------------------------------------------connection closed
pxGrid client certificate configuration
The following procedure represents the steps for generating keys for the pxGrid client, creating the CSR request,
importing certificates converting them to DER adding to the keystores.
Note: The pxGrid client configuration is for having a CA-signed pxGrid client and CA-signed pxGrid node certificate. Please see references for other
certificate deployment considerations.
The process is described below:

A private key is generated for the pxGrid client

A CSR (Certificate Signing Request) is generated from the private key. A challenge key is required which
will be used later on for keystore management

The CA Authority signs the CSR request with a valid pxGrid template as defined earlier

A PKCS#12 file will be created from the public/private key pair and root certificate. This will be used for
keystore creation of the keystoreFilename (JKS) and truststoreFilename (JKS)

The keystoreFilename (JKS) will be created

The truststoreFilename (JKS) will be created

Import the ISE identity certificate from the ISE MnT primary and ISE MnT secondary nodes used for active
session record or bulk download sessions.
Cisco Systems © 2015
Page 24
SECURE ACCESS HOW-TO GUIDES

Convert the ISE identity certificate PEM file to a DER format and add to the truststorefileName keystore along
with the CA root certificate

Import the pxGrid client certificate into the keystoreFilename (JKS)

Import the CA Root certificate into the tuststoreFilename (JKS)

Copy both files into the pxGrid “../samples/bin/.. “ folder and run the scripts
Step 1
Generate a private key
Generate a private key (i.e. mac.key) for the pxGrid client.
Note: this can be .key name can be any name, here I called it mac.key
openssl genrsa -out mac.key 4096
Generating RSA private key, 4096 bit long modulus
.............................................................................................................
.....................++
...............++
e is 65537 (0x10001)
Step 1
Generate the CSR request
Generate a CSR request (i.e. mac.csr) to the CA Authority. Provide a challenge password (i.e. cisco123)
Note: the .csr can be any name, here I called it mac.csr for uniformity, also the challenge password can be any name
openssl req -new -key mac.key -out mac.csr
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
----Country Name (2 letter code) [AU]:
State or Province Name (full name) [Some-State]:
Locality Name (eg, city) []:
Organization Name (eg, company) [Internet Widgits Pty Ltd]:
Organizational Unit Name (eg, section) []:
Common Name (e.g. server FQDN or YOUR name) []:
Email Address []:
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:cisco123
An optional company name []:Eppich, Inc
the same password throughout this documnent, easier to maintain, and cut down on errors
Step 2
CA authority signs the pxGrid CSR request.
The CA authority must service the user certificate using a pxGrid template with both EKUs for client
authentication and server authentication.
Note: A CA template of Windows 2003 was selected, so it would appear in the Drop-down. A user template was duplicated with both EKUs for client
and server authentication.
Cisco Systems © 2015
Page 25
SECURE ACCESS HOW-TO GUIDES
Step 3
Create the PKCS12 file
Create a pxGrid client pkcs12 file (mac.p12) from the private key in the pxGrid client certificate (i.e.
mac.cer). This will be used for keystore management and can be a random filename with a .p12 extension.
Include the CA root file (i.e. root2a).
openssl pkcs12 -export -out mac.p12 -inkey mac.key -in mac.cer -chain -CAfile root2a.cer
Enter Export Password: cisco123
Verifying - Enter Export Password: cisco123
Step 4
Create the keystoreFilename for the pxGrid client
Create the pxGrid client identity keystore (i.e. mac.jks). This will be the pxGrid client identity keystore.
This can be a random filename with a .jks extension. This will serve as the keystoreFilename and
associated keystorePassword in the pxGrid script examples.
keytool -importkeystore -srckeystore mac.p12 -destkeystore mac.jks -srcstoretype PKCS12
Enter destination keystore password: cisco123
Re-enter new password: cisco123
Enter source keystore password:
Entry for alias 1 successfully imported.
Import command completed: 1 entries successfully imported, 0 entries failed or cancelled
Step 5
Export the public ISE Identity certificate from the ISE MnT Primary and ISE MnT Secondary nodes
Export only the public ISE Identity certificate into the pxGrid client, note that this will be in .pem format.
You can rename the file with .pem extension to make it easier to read. In this example, the file was
renamed to mnt1.pem.
Note: Both ISE MnT Primary and ISE MnT Secondary nodes are required by the pxGrid client if pxGrid Active-Standby is configured
Cisco Systems © 2015
Page 26
SECURE ACCESS HOW-TO GUIDES
Step 6
Convert the ISE Identity MnT node PEM format to DER format
openssl x509 -outform der -in mnt1.pem -out mnt1.der
Step 7
Add the ISE MnT DER file to truststoreFilename
Add the ISE identity cert to the trust keystore (i.e. caroot1.jks). this will be the trusted keystore. This can
be a random filename with a .jks extension. This will become the truststoreFilename and
truststorePassword used in the pxGrid scripts.
keytool -import -alias isemnt -keystore caroot1.jks -file mnt1.der
Enter keystore password: cisco123
Re-enter new password: cisco123
Owner: CN=ise.lab6.com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 61262d7600000000000d
Valid from: Wed Dec 10 16:39:24 EST 2014 until: Sat Dec 10 16:49:24 EST 2016
Certificate fingerprints:
MD5: 2B:3D:24:04:D3:FF:1F:1E:7E:57:8E:44:4A:AF:6D:51
SHA1: BD:18:C0:DD:4D:DD:43:80:CA:CA:3B:F6:DC:1E:6E:46:93:59:FE:B7
SHA256:
F9:11:FC:EC:BC:0F:0F:84:36:F1:26:BC:5A:09:B7:2B:3C:D1:1B:AC:FC:1A:F1:AB:6D:00:8D:11:F8:26:93:FF
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.2.840.113549.1.9.15 Criticality=false
0000: 30 35 30 0E 06 08 2A 86
48 86 F7 0D 03 02 02 02
0010: 00 80 30 0E 06 08 2A 86
48 86 F7 0D 03 04 02 02
0020: 00 80 30 07 06 05 2B 0E
03 02 07 30 0A 06 08 2A
0030: 86 48 86 F7 0D 03 07
050...*.H.......
..0...*.H.......
..0...+....0...*
.H.....
#2: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
0000: 30 32 30 0A 06 08 2B 06
01 05 05 07 03 01 30 0A
0010: 06 08 2B 06 01 05 05 07
03 02 30 0A 06 08 2B 06
0020: 01 05 05 07 03 04 30 0C
06 0A 2B 06 01 04 01 82
0030: 37 0A 03 04
020...+.......0.
..+.......0...+.
......0...+.....
7...
#3: ObjectId: 1.3.6.1.4.1.311.21.7
0000: 30 2D 06 25 2B 06 01 04
01
0010: 87 CB EB 79 81 89 9D 2D
86
0020: 5E 86 D1 B8 23 85 FC EF
40
0-.%+.....7.....
...y...-...S...8
^...#...@..d...
Criticality=false
82 37 15 08 DC FD 1A
E6 FC 53 86 82 A1 38
02 01 64 02 01 03
#4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
Cisco Systems © 2015
Page 27
SECURE ACCESS HOW-TO GUIDES
[
accessMethod: caIssuers
accessLocation: URIName: ldap:///CN=lab6-WIN-BG7GPQ053IDCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?cACertificate?base?objectCla
ss=certificationAuthority
]
]
#5: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
#6: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: ldap:///CN=lab6-WIN-BG7GPQ053ID-CA,CN=WINBG7GPQ053ID,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?certificateRevocati
onList?base?objectClass=cRLDistributionPoint]
]]
#7: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[] ]
]
#8: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
emailProtection
1.3.6.1.4.1.311.10.3.4
]
#9: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
#10: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: DA 39 A3 EE 5E 6B 4B 0D
32 55 BF EF 95 60 18 90
0010: AF D8 07 09
]
]
.9..^kK.2U...`..
....
Trust this certificate? [no]: yes
Certificate was added to keystroke
Step 8
Import the pxGrid client into keystoreFilename
Import the pxGrid client certificate into the identity keystore.
Johns-MacBook-Pro:pxGridsdk jeppich$ keytool -import -alias pxGridMAC -keystore mac.jks -file
mac.cer
Enter keystore password: cisco123
Certificate already exists in keystore under alias <1>
Do you still want to add it? [no]: yes
Certificate was added to keystore
Cisco Systems © 2015
Page 28
SECURE ACCESS HOW-TO GUIDES
Note: If you receive the following message the certficate was already added to a pre-existing keystore, you
can say “no” and still be okay. I selected “yes” so we can verify thay the certificate was added later on.
Step 9
Add the CA root certificate to the truststoreFilename
Add the CA root certificate to trusted keystore. The CA root certificate needs to be trusted as well.
keytool -import -alias ca_root1 -keystore caroot1.jks -file root2a.cer
Enter keystore password: cisco123
Owner: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 448a6d6486c91cb14c6888c127d16c4e
Valid from: Thu Nov 13 20:47:06 EST 2014 until: Wed Nov 13 20:57:06 EST 2019
Certificate fingerprints:
MD5: 41:10:8A:F5:36:76:79:9C:2C:00:03:47:55:F8:CF:7B
SHA1: 9D:DA:06:AF:06:3F:8F:5E:84:C7:F4:58:50:95:03:22:64:48:96:9F
SHA256:
DB:28:50:D6:47:CA:C0:6A:E9:7B:87:B4:0E:9C:3A:C1:A2:61:EA:D1:29:8B:45:B4:76:4B:DA:2A:F1:D8:E0:A3
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.3.6.1.4.1.311.21.1 Criticality=false
0000: 02 01 00
...
#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
#3: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_CertSign
Crl_Sign
]
#4: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
Trust this certificate? [no]: yes
Certificate was added to keystore
Step 10
Copy the identity keystore (mac.jks) and trust keystore (caroot1.jks) into the pxGrid “../samples/bin/..”
folder.
Cisco Systems © 2015
Page 29
SECURE ACCESS HOW-TO GUIDES
pxGrid client Active-Standby Examples
For pxGrid Active-Standby, you need to export both primary MnT and secondary MnT public certificates (PEM) to
pxGrid client and convert them both to DER. Both certificates need to be added to the truststoreFilename keystore
along with the CA Root certificate (root2a.cer)
Johns-Macbook-Pro:mntnodes jeppich$ openssl x509 -outform der -in mnt1.pem -out mnt1.der
Johns-Macbook-Pro:mntnodes jeppich$ keytool -import -alias lab1 -keystore caroot1.jks -file mnt1.der
Enter keystore password:
Re-enter new password:
Owner: CN=mnt1.lab6.com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 61326a18000000000031
Valid from: Tue Jan 20 20:08:40 EST 2015 until: Fri Jan 20 20:18:40 EST 2017
Certificate fingerprints:
MD5: D7:EC:5C:10:37:8D:6A:64:4C:51:BE:0B:7E:46:A4:36
SHA1: 6A:CF:48:0D:55:34:41:AA:D8:68:2C:06:86:6E:85:1A:80:7A:8E:BE
SHA256:
66:7C:74:C3:D8:50:D0:09:A2:AA:60:5C:9D:97:09:D9:75:30:DD:3D:4B:56:47:77:91:47:84:DF:46:57:53:6F
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.2.840.113549.1.9.15 Criticality=false
0000: 30 35 30 0E 06 08 2A 86
48 86 F7 0D 03 02 02 02
0010: 00 80 30 0E 06 08 2A 86
48 86 F7 0D 03 04 02 02
0020: 00 80 30 07 06 05 2B 0E
03 02 07 30 0A 06 08 2A
0030: 86 48 86 F7 0D 03 07
050...*.H.......
..0...*.H.......
..0...+....0...*
.H.....
#2: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
0000: 30 32 30 0A 06 08 2B 06
01 05 05 07 03 01 30 0A
0010: 06 08 2B 06 01 05 05 07
03 02 30 0A 06 08 2B 06
0020: 01 05 05 07 03 04 30 0C
06 0A 2B 06 01 04 01 82
0030: 37 0A 03 04
020...+.......0.
..+.......0...+.
......0...+.....
7...
#3: ObjectId: 1.3.6.1.4.1.311.21.7
0000: 30 2D 06 25 2B 06 01 04
01
0010: 87 CB EB 79 81 89 9D 2D
86
0020: 5E 86 D1 B8 23 85 FC EF
40
0-.%+.....7.....
...y...-...S...8
^...#...@..d...
Criticality=false
82 37 15 08 DC FD 1A
E6 FC 53 86 82 A1 38
02 01 64 02 01 03
#4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
accessLocation: URIName: ldap:///CN=lab6-WIN-BG7GPQ053IDCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?cACertificate?base?objectCla
ss=certificationAuthority
]
]
#5: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
#6: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
Cisco Systems © 2015
Page 30
SECURE ACCESS HOW-TO GUIDES
[URIName: ldap:///CN=lab6-WIN-BG7GPQ053ID-CA,CN=WINBG7GPQ053ID,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?certificateRevocati
onList?base?objectClass=cRLDistributionPoint]
]]
#7: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[] ]
]
#8: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
emailProtection
1.3.6.1.4.1.311.10.3.4
]
#9: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
#10: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mnt1.lab6.com
]
#11: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: DA 39 A3 EE 5E 6B 4B 0D
32 55 BF EF 95 60 18 90
0010: AF D8 07 09
]
]
.9..^kK.2U...`..
....
Trust this certificate? [no]: yes
Certificate was added to keystore
Johns-Macbook-Pro:mntnodes jeppich$ openssl x509 -outform der -in mnt2.pem -out mnt2.der
Johns-Macbook-Pro:mntnodes jeppich$ keytool -import -alias lab1 -keystore caroot1.jks -file mnt2.der
Enter keystore password:
keytool error: java.lang.Exception: Certificate not imported, alias <lab1> already exists
Johns-Macbook-Pro:mntnodes jeppich$ keytool -import -alias lab2 -keystore caroot1.jks -file mnt2.der
Enter keystore password:
Owner: CN=mnt2.lab6.com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 613244ec000000000044
Valid from: Wed Mar 04 18:11:54 EST 2015 until: Fri Mar 03 18:11:54 EST 2017
Certificate fingerprints:
MD5: 1E:96:5E:35:A1:3E:FA:CD:16:32:A7:01:2C:5A:E6:12
SHA1: 8F:0D:8A:58:DD:80:82:D3:56:F1:CE:26:E4:A3:C3:3F:F8:F6:D1:28
SHA256:
3A:70:F0:E6:43:93:E8:10:11:C5:FE:61:24:66:A2:C8:2A:FA:AC:04:38:4A:B5:B6:20:2C:E6:3C:21:D5:45:C3
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.3.6.1.4.1.311.20.2 Criticality=false
0000: 1E 12 00 57 00 65 00 62
00 53 00 65 00 72 00 76
0010: 00 65 00 72
...W.e.b.S.e.r.v
.e.r
#2: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
Cisco Systems © 2015
Page 31
SECURE ACCESS HOW-TO GUIDES
accessLocation: URIName: ldap:///CN=lab6-WIN-BG7GPQ053IDCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?cACertificate?base?objectCla
ss=certificationAuthority
]
]
#3: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
#4: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: ldap:///CN=lab6-WIN-BG7GPQ053ID-CA,CN=WINBG7GPQ053ID,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?certificateRevocati
onList?base?objectClass=cRLDistributionPoint]
]]
#5: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
]
#6: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
#7: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mnt2.lab6.com
]
#8: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: DA 39 A3 EE 5E 6B 4B 0D
32 55 BF EF 95 60 18 90
0010: AF D8 07 09
]
]
.9..^kK.2U...`..
....
Trust this certificate? [no]: yes
Certificate was added to keystore
Johns-Macbook-Pro:mntnodes jeppich$ keytool -list -v -keystore caroot1.jks
Enter keystore password:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 2 entries
Alias name: lab2
Creation date: Mar 4, 2015
Entry type: trustedCertEntry
Owner: CN=mnt2.lab6.com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 613244ec000000000044
Valid from: Wed Mar 04 18:11:54 EST 2015 until: Fri Mar 03 18:11:54 EST 2017
Certificate fingerprints:
MD5: 1E:96:5E:35:A1:3E:FA:CD:16:32:A7:01:2C:5A:E6:12
SHA1: 8F:0D:8A:58:DD:80:82:D3:56:F1:CE:26:E4:A3:C3:3F:F8:F6:D1:28
SHA256:
3A:70:F0:E6:43:93:E8:10:11:C5:FE:61:24:66:A2:C8:2A:FA:AC:04:38:4A:B5:B6:20:2C:E6:3C:21:D5:45:C3
Signature algorithm name: SHA256withRSA
Version: 3
Cisco Systems © 2015
Page 32
SECURE ACCESS HOW-TO GUIDES
Extensions:
#1: ObjectId: 1.3.6.1.4.1.311.20.2 Criticality=false
0000: 1E 12 00 57 00 65 00 62
00 53 00 65 00 72 00 76
0010: 00 65 00 72
...W.e.b.S.e.r.v
.e.r
#2: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
accessLocation: URIName: ldap:///CN=lab6-WIN-BG7GPQ053IDCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?cACertificate?base?objectCla
ss=certificationAuthority
]
]
#3: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
#4: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: ldap:///CN=lab6-WIN-BG7GPQ053ID-CA,CN=WINBG7GPQ053ID,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?certificateRevocati
onList?base?objectClass=cRLDistributionPoint]
]]
#5: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
]
#6: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
#7: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mnt2.lab6.com
]
#8: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: DA 39 A3 EE 5E 6B 4B 0D
32 55 BF EF 95 60 18 90
0010: AF D8 07 09
]
]
.9..^kK.2U...`..
....
*******************************************
*******************************************
Alias name: lab1
Creation date: Mar 4, 2015
Entry type: trustedCertEntry
Owner: CN=mnt1.lab6.com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 61326a18000000000031
Cisco Systems © 2015
Page 33
SECURE ACCESS HOW-TO GUIDES
Valid from: Tue Jan 20 20:08:40 EST 2015 until: Fri Jan 20 20:18:40 EST 2017
Certificate fingerprints:
MD5: D7:EC:5C:10:37:8D:6A:64:4C:51:BE:0B:7E:46:A4:36
SHA1: 6A:CF:48:0D:55:34:41:AA:D8:68:2C:06:86:6E:85:1A:80:7A:8E:BE
SHA256:
66:7C:74:C3:D8:50:D0:09:A2:AA:60:5C:9D:97:09:D9:75:30:DD:3D:4B:56:47:77:91:47:84:DF:46:57:53:6F
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.2.840.113549.1.9.15 Criticality=false
0000: 30 35 30 0E 06 08 2A 86
48 86 F7 0D 03 02 02 02
0010: 00 80 30 0E 06 08 2A 86
48 86 F7 0D 03 04 02 02
0020: 00 80 30 07 06 05 2B 0E
03 02 07 30 0A 06 08 2A
0030: 86 48 86 F7 0D 03 07
050...*.H.......
..0...*.H.......
..0...+....0...*
.H.....
#2: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
0000: 30 32 30 0A 06 08 2B 06
01 05 05 07 03 01 30 0A
0010: 06 08 2B 06 01 05 05 07
03 02 30 0A 06 08 2B 06
0020: 01 05 05 07 03 04 30 0C
06 0A 2B 06 01 04 01 82
0030: 37 0A 03 04
020...+.......0.
..+.......0...+.
......0...+.....
7...
#3: ObjectId: 1.3.6.1.4.1.311.21.7
0000: 30 2D 06 25 2B 06 01 04
01
0010: 87 CB EB 79 81 89 9D 2D
86
0020: 5E 86 D1 B8 23 85 FC EF
40
0-.%+.....7.....
...y...-...S...8
^...#...@..d...
Criticality=false
82 37 15 08 DC FD 1A
E6 FC 53 86 82 A1 38
02 01 64 02 01 03
#4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
accessLocation: URIName: ldap:///CN=lab6-WIN-BG7GPQ053IDCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?cACertificate?base?objectCla
ss=certificationAuthority
]
]
#5: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
#6: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: ldap:///CN=lab6-WIN-BG7GPQ053ID-CA,CN=WINBG7GPQ053ID,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?certificateRevocati
onList?base?objectClass=cRLDistributionPoint]
]]
#7: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[] ]
]
#8: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
emailProtection
1.3.6.1.4.1.311.10.3.4
]
Cisco Systems © 2015
Page 34
SECURE ACCESS HOW-TO GUIDES
#9: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
#10: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mnt1.lab6.com
]
#11: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: DA 39 A3 EE 5E 6B 4B 0D
32 55 BF EF 95 60 18 90
0010: AF D8 07 09
]
]
.9..^kK.2U...`..
....
*******************************************
*******************************************
Johns-Macbook-Pro:mntnodes jeppich$ openssl x509 -outform der -in root2a.cer -out root2a.der
Johns-Macbook-Pro:mntnodes jeppich$ keytool -import -alias lab3 -keystore caroot1.jks -file root2a.der
Enter keystore password:
Owner: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 448a6d6486c91cb14c6888c127d16c4e
Valid from: Thu Nov 13 20:47:06 EST 2014 until: Wed Nov 13 20:57:06 EST 2019
Certificate fingerprints:
MD5: 41:10:8A:F5:36:76:79:9C:2C:00:03:47:55:F8:CF:7B
SHA1: 9D:DA:06:AF:06:3F:8F:5E:84:C7:F4:58:50:95:03:22:64:48:96:9F
SHA256:
DB:28:50:D6:47:CA:C0:6A:E9:7B:87:B4:0E:9C:3A:C1:A2:61:EA:D1:29:8B:45:B4:76:4B:DA:2A:F1:D8:E0:A3
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.3.6.1.4.1.311.21.1 Criticality=false
0000: 02 01 00
...
#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
#3: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_CertSign
Crl_Sign
]
#4: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
Trust this certificate? [no]: yes
Certificate was added to keystore
Cisco Systems © 2015
Page 35
SECURE ACCESS HOW-TO GUIDES
Testing pxGrid client in ISE Distributed Environment
The pxGrid scripts: register.sh and session download.sh will be run to ensure pxGrid client connection and pxGrid
registration. Session downloads will ensure that there are no issues with the ISE MNT certificate and the pxGrid
client.
Step 1
Register the pxGrid client
Johns-Macbook-Pro:bin jeppich$ ./register.sh -keystoreFilename mac.jks -keystorePassword cisco123 truststoreFilename caroot1.jks -truststorePassword cisco123 -hostname 10.0.0.48 -username mac1 -group Session
------- properties ------version=1.0.0
hostnames=10.0.0.48
username=mac1
descriptipon=null
keystoreFilename=mac.jks
keystorePassword=cisco123
truststoreFilename=caroot1.jks
truststorePassword=cisco123
-------------------------registering...
connecting...
connected.
done registering.
connection closed
Johns-Macbook-Pro:bin jeppich$
Verify the pxGrid client has registered to the pxGrid controller
Administration->pxGrid Services
Step 2
Run the Session download
Johns-Macbook-Pro:bin jeppich$ ./session_download.sh -keystoreFilename mac.jks -keystorePassword cisco123 truststoreFilename caroot1.jks -truststorePassword cisco123 -hostname 10.0.0.48 -username mac1
------- properties ------version=1.0.0
hostnames=10.0.0.48
username=mac1
keystoreFilename=mac.jks
keystorePassword=cisco123
truststoreFilename=caroot1.jks
truststorePassword=cisco123
filter=null
start=null
Cisco Systems © 2015
Page 36
SECURE ACCESS HOW-TO GUIDES
end=null
-------------------------connecting...
connected.
starting at Thu Mar 05 21:45:49 EST 2015...
session (ip=10.0.0.17, Audit Session Id=0A0000020000000D02D814C0, User Name=jeppich, AD User DNS
Domain=lab6.com, AD Host DNS Domain=null, AD User NetBIOS Name=LAB6, AD Host NETBIOS Name=null, Calling
station id=00:0C:29:77:D6:85, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint
Profile=VMWare-Device, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/23, RADIUSAVPairs=[ Acct-SessionId=00000004], Posture Status=null, Posture Timestamp=, Session Last Update Time=Thu Mar 05 21:33:02 EST 2015
)
session (ip=null, Audit Session Id=0A0000020000000C0003672C, User Name=68:EF:BD:F6:76:56, AD User DNS
Domain=null, AD Host DNS Domain=null, AD User NetBIOS Name=null, AD Host NETBIOS Name=null, Calling station
id=68:EF:BD:F6:76:56, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint Profile=CiscoDevice, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/15, RADIUSAVPairs=[ Acct-Session-Id=00000005], Posture
Status=null, Posture Timestamp=, Session Last Update Time=Thu Mar 05 21:33:44 EST 2015 )... ending at: Thu
Mar 05 21:45:49 EST 2015
--------------------------------------------------downloaded 2 sessions in 35 milliseconds
--------------------------------------------------connection closed
Viewing Keystore Entries
By viewing the keystore entries you can view the trusted certificate entries for the keystoreFilename and
truststoreFilename keystores.
Step 1
Verify caroot1.jks, the truststoreFilename keystore
Johns-Macbook-Pro:bin jeppich$ keytool -list -v -keystore caroot1.jks
Enter keystore password:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 3 entries
Alias name: lab3
Creation date: Mar 4, 2015
Entry type: trustedCertEntry
Owner: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 448a6d6486c91cb14c6888c127d16c4e
Valid from: Thu Nov 13 20:47:06 EST 2014 until: Wed Nov 13 20:57:06 EST 2019
Certificate fingerprints:
MD5: 41:10:8A:F5:36:76:79:9C:2C:00:03:47:55:F8:CF:7B
SHA1: 9D:DA:06:AF:06:3F:8F:5E:84:C7:F4:58:50:95:03:22:64:48:96:9F
SHA256:
DB:28:50:D6:47:CA:C0:6A:E9:7B:87:B4:0E:9C:3A:C1:A2:61:EA:D1:29:8B:45:B4:76:4B:DA:2A:F1:D8:E0:A3
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.3.6.1.4.1.311.21.1 Criticality=false
0000: 02 01 00
...
#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
Cisco Systems © 2015
Page 37
SECURE ACCESS HOW-TO GUIDES
CA:true
PathLen:2147483647
]
#3: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_CertSign
Crl_Sign
]
#4: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
*******************************************
*******************************************
Alias name: lab2
Creation date: Mar 4, 2015
Entry type: trustedCertEntry
Owner: CN=mnt2.lab6.com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 613244ec000000000044
Valid from: Wed Mar 04 18:11:54 EST 2015 until: Fri Mar 03 18:11:54 EST 2017
Certificate fingerprints:
MD5: 1E:96:5E:35:A1:3E:FA:CD:16:32:A7:01:2C:5A:E6:12
SHA1: 8F:0D:8A:58:DD:80:82:D3:56:F1:CE:26:E4:A3:C3:3F:F8:F6:D1:28
SHA256:
3A:70:F0:E6:43:93:E8:10:11:C5:FE:61:24:66:A2:C8:2A:FA:AC:04:38:4A:B5:B6:20:2C:E6:3C:21:D5:45:C3
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.3.6.1.4.1.311.20.2 Criticality=false
0000: 1E 12 00 57 00 65 00 62
00 53 00 65 00 72 00 76
0010: 00 65 00 72
...W.e.b.S.e.r.v
.e.r
#2: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
accessLocation: URIName: ldap:///CN=lab6-WIN-BG7GPQ053IDCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?cACertificate?base?objectCla
ss=certificationAuthority
]
]
#3: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
#4: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
Cisco Systems © 2015
Page 38
SECURE ACCESS HOW-TO GUIDES
[URIName: ldap:///CN=lab6-WIN-BG7GPQ053ID-CA,CN=WINBG7GPQ053ID,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?certificateRevocati
onList?base?objectClass=cRLDistributionPoint]
]]
#5: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
]
#6: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
#7: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mnt2.lab6.com
]
#8: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: DA 39 A3 EE 5E 6B 4B 0D
32 55 BF EF 95 60 18 90
0010: AF D8 07 09
]
]
.9..^kK.2U...`..
....
*******************************************
*******************************************
Alias name: lab1
Creation date: Mar 4, 2015
Entry type: trustedCertEntry
Owner: CN=mnt1.lab6.com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 61326a18000000000031
Valid from: Tue Jan 20 20:08:40 EST 2015 until: Fri Jan 20 20:18:40 EST 2017
Certificate fingerprints:
MD5: D7:EC:5C:10:37:8D:6A:64:4C:51:BE:0B:7E:46:A4:36
SHA1: 6A:CF:48:0D:55:34:41:AA:D8:68:2C:06:86:6E:85:1A:80:7A:8E:BE
SHA256:
66:7C:74:C3:D8:50:D0:09:A2:AA:60:5C:9D:97:09:D9:75:30:DD:3D:4B:56:47:77:91:47:84:DF:46:57:53:6F
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.2.840.113549.1.9.15 Criticality=false
0000: 30 35 30 0E 06 08 2A 86
48 86 F7 0D 03 02 02 02
0010: 00 80 30 0E 06 08 2A 86
48 86 F7 0D 03 04 02 02
0020: 00 80 30 07 06 05 2B 0E
03 02 07 30 0A 06 08 2A
0030: 86 48 86 F7 0D 03 07
050...*.H.......
..0...*.H.......
..0...+....0...*
.H.....
#2: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
0000: 30 32 30 0A 06 08 2B 06
01 05 05 07 03 01 30 0A
0010: 06 08 2B 06 01 05 05 07
03 02 30 0A 06 08 2B 06
0020: 01 05 05 07 03 04 30 0C
06 0A 2B 06 01 04 01 82
0030: 37 0A 03 04
020...+.......0.
..+.......0...+.
......0...+.....
7...
#3: ObjectId: 1.3.6.1.4.1.311.21.7
0000: 30 2D 06 25 2B 06 01 04
01
0010: 87 CB EB 79 81 89 9D 2D
86
0020: 5E 86 D1 B8 23 85 FC EF
40
0-.%+.....7.....
...y...-...S...8
^...#...@..d...
Cisco Systems © 2015
Criticality=false
82 37 15 08 DC FD 1A
E6 FC 53 86 82 A1 38
02 01 64 02 01 03
Page 39
SECURE ACCESS HOW-TO GUIDES
#4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
accessLocation: URIName: ldap:///CN=lab6-WIN-BG7GPQ053IDCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?cACertificate?base?objectCla
ss=certificationAuthority
]
]
#5: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
#6: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: ldap:///CN=lab6-WIN-BG7GPQ053ID-CA,CN=WINBG7GPQ053ID,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?certificateRevocati
onList?base?objectClass=cRLDistributionPoint]
]]
#7: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[] ]
]
#8: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
emailProtection
1.3.6.1.4.1.311.10.3.4
]
#9: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
#10: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mnt1.lab6.com
]
#11: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: DA 39 A3 EE 5E 6B 4B 0D
32 55 BF EF 95 60 18 90
0010: AF D8 07 09
]
]
.9..^kK.2U...`..
....
*******************************************
*******************************************
Johns-Macbook-Pro:bin jeppich$
Cisco Systems © 2015
Page 40
SECURE ACCESS HOW-TO GUIDES
Step 2
Verify mac.jks, the keystoreFilename keystore
Johns-Macbook-Pro:bin jeppich$ keytool -list -v -keystore mac.jks
Enter keystore password:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 2 entries
Alias name: 1
Creation date: Jan 28, 2015
Entry type: PrivateKeyEntry
Certificate chain length: 2
Certificate[1]:
Owner: O=Internet Widgits Pty Ltd, ST=Some-State, C=AU
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 6118d613000000000034
Valid from: Wed Jan 28 14:35:54 EST 2015 until: Sat Jan 28 14:45:54 EST 2017
Certificate fingerprints:
MD5: 93:E4:D9:1B:00:5B:48:75:C1:9F:36:BC:B7:5C:27:73
SHA1: 33:79:37:44:81:EA:68:B8:EC:A3:26:75:18:70:AA:11:E4:58:B2:AF
SHA256:
DA:6C:BA:E3:E8:76:DD:8A:30:BA:EE:0B:46:3B:78:BF:F9:CE:B4:68:2C:5D:CE:8A:9D:FB:66:A8:1F:97:BE:4A
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.2.840.113549.1.9.15 Criticality=false
0000: 30 35 30 0E 06 08 2A 86
48 86 F7 0D 03 02 02 02
0010: 00 80 30 0E 06 08 2A 86
48 86 F7 0D 03 04 02 02
0020: 00 80 30 07 06 05 2B 0E
03 02 07 30 0A 06 08 2A
0030: 86 48 86 F7 0D 03 07
050...*.H.......
..0...*.H.......
..0...+....0...*
.H.....
#2: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
0000: 30 32 30 0A 06 08 2B 06
01 05 05 07 03 01 30 0A
0010: 06 08 2B 06 01 05 05 07
03 02 30 0A 06 08 2B 06
0020: 01 05 05 07 03 04 30 0C
06 0A 2B 06 01 04 01 82
0030: 37 0A 03 04
020...+.......0.
..+.......0...+.
......0...+.....
7...
#3: ObjectId: 1.3.6.1.4.1.311.21.7
0000: 30 2D 06 25 2B 06 01 04
01
0010: 87 CB EB 79 81 89 9D 2D
86
0020: 5E 86 D1 B8 23 85 FC EF
40
0-.%+.....7.....
...y...-...S...8
^...#...@..d...
Criticality=false
82 37 15 08 DC FD 1A
E6 FC 53 86 82 A1 38
02 01 64 02 01 03
#4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
accessLocation: URIName: ldap:///CN=lab6-WIN-BG7GPQ053IDCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?cACertificate?base?objectCla
ss=certificationAuthority
]
]
#5: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
#6: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
Cisco Systems © 2015
Page 41
SECURE ACCESS HOW-TO GUIDES
[URIName: ldap:///CN=lab6-WIN-BG7GPQ053ID-CA,CN=WINBG7GPQ053ID,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?certificateRevocati
onList?base?objectClass=cRLDistributionPoint]
]]
#7: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[] ]
]
#8: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
emailProtection
1.3.6.1.4.1.311.10.3.4
]
#9: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
#10: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 81 52 81 84 98 22 43 85
5E 95 06 14 D2 5A A8 70
0010: 15 06 CF DB
]
]
.R..."C.^....Z.p
....
Certificate[2]:
Owner: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 448a6d6486c91cb14c6888c127d16c4e
Valid from: Thu Nov 13 20:47:06 EST 2014 until: Wed Nov 13 20:57:06 EST 2019
Certificate fingerprints:
MD5: 41:10:8A:F5:36:76:79:9C:2C:00:03:47:55:F8:CF:7B
SHA1: 9D:DA:06:AF:06:3F:8F:5E:84:C7:F4:58:50:95:03:22:64:48:96:9F
SHA256:
DB:28:50:D6:47:CA:C0:6A:E9:7B:87:B4:0E:9C:3A:C1:A2:61:EA:D1:29:8B:45:B4:76:4B:DA:2A:F1:D8:E0:A3
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.3.6.1.4.1.311.21.1 Criticality=false
0000: 02 01 00
...
#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
#3: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_CertSign
Crl_Sign
]
#4: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
Cisco Systems © 2015
...&..7..Z.6&...
j.y,
Page 42
SECURE ACCESS HOW-TO GUIDES
]
*******************************************
*******************************************
Alias name: macstore
Creation date: Jan 28, 2015
Entry type: trustedCertEntry
Owner: O=Internet Widgits Pty Ltd, ST=Some-State, C=AU
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com
Serial number: 6118d613000000000034
Valid from: Wed Jan 28 14:35:54 EST 2015 until: Sat Jan 28 14:45:54 EST 2017
Certificate fingerprints:
MD5: 93:E4:D9:1B:00:5B:48:75:C1:9F:36:BC:B7:5C:27:73
SHA1: 33:79:37:44:81:EA:68:B8:EC:A3:26:75:18:70:AA:11:E4:58:B2:AF
SHA256:
DA:6C:BA:E3:E8:76:DD:8A:30:BA:EE:0B:46:3B:78:BF:F9:CE:B4:68:2C:5D:CE:8A:9D:FB:66:A8:1F:97:BE:4A
Signature algorithm name: SHA256withRSA
Version: 3
Extensions:
#1: ObjectId: 1.2.840.113549.1.9.15 Criticality=false
0000: 30 35 30 0E 06 08 2A 86
48 86 F7 0D 03 02 02 02
0010: 00 80 30 0E 06 08 2A 86
48 86 F7 0D 03 04 02 02
0020: 00 80 30 07 06 05 2B 0E
03 02 07 30 0A 06 08 2A
0030: 86 48 86 F7 0D 03 07
050...*.H.......
..0...*.H.......
..0...+....0...*
.H.....
#2: ObjectId: 1.3.6.1.4.1.311.21.10 Criticality=false
0000: 30 32 30 0A 06 08 2B 06
01 05 05 07 03 01 30 0A
0010: 06 08 2B 06 01 05 05 07
03 02 30 0A 06 08 2B 06
0020: 01 05 05 07 03 04 30 0C
06 0A 2B 06 01 04 01 82
0030: 37 0A 03 04
020...+.......0.
..+.......0...+.
......0...+.....
7...
#3: ObjectId: 1.3.6.1.4.1.311.21.7
0000: 30 2D 06 25 2B 06 01 04
01
0010: 87 CB EB 79 81 89 9D 2D
86
0020: 5E 86 D1 B8 23 85 FC EF
40
0-.%+.....7.....
...y...-...S...8
^...#...@..d...
Criticality=false
82 37 15 08 DC FD 1A
E6 FC 53 86 82 A1 38
02 01 64 02 01 03
#4: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: caIssuers
accessLocation: URIName: ldap:///CN=lab6-WIN-BG7GPQ053IDCA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?cACertificate?base?objectCla
ss=certificationAuthority
]
]
#5: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: A9 C7 8E 26 9C F5 37 0A
E6 5A 15 36 26 D4 A2 06
0010: 6A C8 79 2C
]
]
...&..7..Z.6&...
j.y,
#6: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: ldap:///CN=lab6-WIN-BG7GPQ053ID-CA,CN=WINBG7GPQ053ID,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=lab6,DC=com?certificateRevocati
onList?base?objectClass=cRLDistributionPoint]
]]
Cisco Systems © 2015
Page 43
SECURE ACCESS HOW-TO GUIDES
#7: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[] ]
]
#8: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
emailProtection
1.3.6.1.4.1.311.10.3.4
]
#9: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
#10: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 81 52 81 84 98 22 43 85
5E 95 06 14 D2 5A A8 70
0010: 15 06 CF DB
]
]
.R..."C.^....Z.p
....
*******************************************
*******************************************
Johns-Macbook-Pro:bin jeppich$
Cisco Systems © 2015
Page 44
SECURE ACCESS HOW-TO GUIDES
ISE Distributed Deployment with pxGrid Active-Standby
Introduction
In this section, we cover pxGrid Active-Standby. In an ISE distributed deployment, there can be only (2) pxGrid
nodes. One handling the pxGrid client connections controlling the pxGrid services and the other one, for fail-over.
One pxGrid node can be active at a time.
The ISE Distributed Deployment with pxGrid Active-Standby consists of the Primary Admin node, Secondary Admin
node, Primary MnT node, Secondary MnT node, two PSNs, and two separate pxGrid personas.
We will add the Secondary Admin node, Secondary MnT node, and secondary pxGrid node to form the pxGrid ActiveStandby Configuration.
The public/private keys are exported from the first or primary pxGrid persona into the Primary Admin and Primary
MnT nodes System Certificates stores.
Note: This has already been configured as part of the initial ISE distributed deployment.
The public/private keys are exported from the second or secondary pxGrid persona into the Secondary Admin and
Secondary MnT nodes System Certificate stores.
The Primary and Secondary MnT Identity certificates are exported into the pxGrid client for bulk active session
downloads. If either of these certificates are missing, you may not see the pxGrid client register.
Registered client accounts, subscriptions, topics, etc. are Active-Active synchronized between pxGrid servers through
PANs . The primary and secondary pxGrid nodes are Active-Standby.
The pxGrid clients connect to the primary PxGrid node. If the primary pxGrid node goes down, the client connects to
the secondary pxGrid node and all registered clients and transactions will be there. This will be illustrated in this
document.
Cisco Systems © 2015
Page 45
SECURE ACCESS HOW-TO GUIDES
Registering ISE nodes for Distributed Environment pxGrid
Active-Standby
Here we register the secondary nodes.
Step 1
Import public/private key pair from the secondary pxGrid node into the secondary PAN.
Administration->System->Certificate->Certificate Management->System Certificates and import the
public/private key of the secondary pxGrid node
Note: This can be done when all nodes are in Stand-alone. This can also be done directly from the Primary PAN.
It is assumed that the public/private key pair from the secondary pxGrid node have been exported.
There is an alternative way for exporting the secondary pxGrid node public/private key pair into the
Secondary PAN and Secondary MnT node for pxGrid operation, please see: Alternative way of generating
pxGrid node Certificate Signing Request (CSR) in the Appendices.
Step 2
Import public/private key pair from the secondary pxGrid node into the secondary PAN.
Administration->System->Certificate->Certificate Management->System Certificates and import the
public/private key of the secondary pxGrid node
Cisco Systems © 2015
Page 46
SECURE ACCESS HOW-TO GUIDES
Step 3
You should the public/private key pairs have been successfully imported into the ISE Secondary PAN, and
ISE Secondary MnT nodes.
Administration->System->Certificates->Certificate Management->System Certificates
Step 4
Register the Secondary Primary admin node through Primary Admin Node
Administration->System->Deployment, register ISE node as the Secondary Admin node
Cisco Systems © 2015
Page 47
SECURE ACCESS HOW-TO GUIDES
Step 5
Register the Secondary Monitoring Node through the Primary Admin node
Administration->System->Deployment, register ISE node as the Secondary Monitoring node
Note: Ensure that the Secondary MnT has joined the domain, check External Identity Services, if the secondary MnT node has not joined the
domain, there will be no connectivity to the pxGrid node.
Cisco Systems © 2015
Page 48
SECURE ACCESS HOW-TO GUIDES
Step 6
Add the Secondary pxGrid node
Administration->System->Deployment, register ISE node as the Secondary pxGrid node
Step 7
Ensure that the pxGrid services have started, and you see the ISE published nodes:
Administration->pxGrid Services
Cisco Systems © 2015
Page 49
SECURE ACCESS HOW-TO GUIDES
Testing pxGrid client in ISE Distributed Environment pxGrid
Active-Standby
This section illustrates the pxGrid-Standby configuration by adding the Secondary PAN, Secondary MnT and
secondary pxGrid node. In addition we will test the configuration by:
Basic Operation:

Registering pxGrid client to primary pxGrid node
Note: In a pxGrid Active-Standby Configuration, only the primary pxGrid node can be active, the secondary pxGrid node is “not running” as
displayed by “sh application status ise” on the pxGrid secondary node

Download active session records from the MnT Primary node

View Registered pxGrid client status in ISE

View Deployment node status to indicate pxGrid node status
Testing pxGrid Node Failover to secondary pxGrid node

“application stop ise” on primary pxGrid node to simulated down pxGrid node

“application start ise” on secondary pxGrid node to start secondary pxGrid node

Download active sessions from MnT Primary node to compare sessions, they should be the same

Register pxGrid client to secondary pxGrid node

View Registered pxGrid client in ISE

View Deployment node status to indicate pxGrid node status
Returning back pxGrid primary node

application stop ise” on secondary pxGrid node

“application start ise” on primary pxGrid node

Download active sessions from MnT Primary node to compare sessions, they should be the same

Register pxGrid client to primary pxGrid node

View Registered pxGrid client in ISE

View Deployment node status to indicate pxGrid node status
Cisco Systems © 2015
Page 50
SECURE ACCESS HOW-TO GUIDES
Testing pxGrid Active-Standby
Basic Operation
Here we register the pxGrid client to the first pxGrid node or the primary pxGrid node while in the pxGrid Active
Standby configuration.
Basic Operation:

Registering pxGrid client to primary pxGrid node
Note: In a pxGrid Active-Standby Configuration, only the primary pxGrid node can be active, the secondary pxGrid node is “not running” as
displayed by “sh application status ise” on the pxGrid secondary node

Download active session records from the MnT Primary node

View Registered pxGrid client status in ISE

View Deployment node status to indicate pxGrid node status
The diagram below illustrates that all nodes are active
Step 1
Verify that all nodes are active
Administration->System->Deployment, you should see all the nodes
Cisco Systems © 2015
Page 51
SECURE ACCESS HOW-TO GUIDES
Step 2
Verify that pxGrid services up and the ISE Primary PAN, ISE Secondary PAN, ISE Primary MnT, and ISE
Secondary MnT node are registered clients.
Administration->pxGrid Services
Step 3
Register a pxGrid client and download the active session records using the pxGrid register and
session_download shell scripts. Note the IP address of the primary and secondary IP address of the pxGrid
nodes for –hostname.
Note: In a productional environment you may have a GUI that designates secondary pxGrid node.
Johns-Macbook-Pro:bin jeppich$ ./register.sh -keystoreFilename mac.jks -keystorePassword cisco123 truststoreFilename caroot1.jks -truststorePassword cisco123 -hostname 10.0.0.48 10.0.0.49 -username
mac_engineering15 -group Session
------- properties ------version=1.0.0
hostnames=10.0.0.48, 10.0.0.49
username=mac_engineering15
descriptipon=null
keystoreFilename=mac.jks
keystorePassword=cisco123
truststoreFilename=caroot1.jks
truststorePassword=cisco123
-------------------------registering...
connecting...
connected.
done registering.
connection closed
Johns-Macbook-Pro:bin jeppich$ ./session_download.sh -keystoreFilename mac.jks -keystorePassword cisco123 truststoreFilename caroot1.jks -truststorePassword cisco123 -hostname 10.0.0.48 10.0.0.49 -username
mac_engineering15
------- properties ------version=1.0.0
hostnames=10.0.0.48, 10.0.0.49
username=mac_engineering15
keystoreFilename=mac.jks
keystorePassword=cisco123
truststoreFilename=caroot1.jks
truststorePassword=cisco123
filter=null
start=null
end=null
-------------------------connecting...
connected.
starting at Thu Mar 05 00:54:43 EST 2015...
Cisco Systems © 2015
Page 52
SECURE ACCESS HOW-TO GUIDES
session (ip=10.0.0.17, Audit Session Id=0A0000020000000E027B9538, User Name=jeppich, AD User DNS
Domain=lab6.com, AD Host DNS Domain=null, AD User NetBIOS Name=LAB6, AD Host NETBIOS Name=null, Calling
station id=00:0C:29:77:D6:85, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint
Profile=VMWare-Device, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/23, RADIUSAVPairs=[ Acct-SessionId=00000006], Posture Status=null, Posture Timestamp=, Session Last Update Time=Wed Mar 04 20:06:47 EST 2015
)
session (ip=10.0.0.51, Audit Session Id=0A0000020000000C00035232, User Name=68:EF:BD:F6:76:56, AD User DNS
Domain=null, AD Host DNS Domain=null, AD User NetBIOS Name=null, AD Host NETBIOS Name=null, Calling station
id=68:EF:BD:F6:76:56, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint Profile=CiscoDevice, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/15, RADIUSAVPairs=[ Acct-Session-Id=00000004], Posture
Status=null, Posture Timestamp=, Session Last Update Time=Wed Mar 04 21:18:38 EST 2015 )... ending at: Thu
Mar 05 00:54:43 EST 2015
--------------------------------------------------downloaded 2 sessions in 12 milliseconds
---------------------------------------------------
Step 4
You should see the registered client, mac_engineering15
Administration->pxGrid Services
Cisco Systems © 2015
Page 53
SECURE ACCESS HOW-TO GUIDES
Testing FailOver
Testing pxGrid Node Failover to secondary pxGrid node

“application stop ise” on primary pxGrid node to simulated down pxGrid node

“application start ise” on secondary pxGrid node to start secondary pxGrid node

Download active sessions from MnT Primary node to compare sessions, they should be the same

Register pxGrid client to secondary pxGrid node

View Registered pxGrid client in ISE

View Deployment node status to indicate pxGrid node status

“application stop ise” on primary pxGrid node to simulated down pxGrid node

“application start ise” on secondary pxGrid node to start secondary pxGrid node

Download active sessions from MnT Primary node to compare sessions, they should be the same
Step 1
Verify that the primary pxGrid node or pxGrid 1 is down.
Administration->System->Deployment
Step 2
Run the register and session download commands to verify that you have connection the secondary pxGrid
node.
Cisco Systems © 2015
Page 54
SECURE ACCESS HOW-TO GUIDES
Johns-Macbook-Pro:bin jeppich$ ./session_download.sh -keystoreFilename mac.jks -keystorePassword cisco123 truststoreFilename caroot1.jks -truststorePassword cisco123 -hostname 10.0.0.49 -username mac_engineering15
------- properties ------version=1.0.0
hostnames=10.0.0.49
username=mac_engineering15
keystoreFilename=mac.jks
keystorePassword=cisco123
truststoreFilename=caroot1.jks
truststorePassword=cisco123
filter=null
start=null
end=null
-------------------------connecting...
connected.
starting at Thu Mar 05 01:32:40 EST 2015...
session (ip=10.0.0.17, Audit Session Id=0A0000020000000E027B9538, User Name=jeppich, AD User DNS
Domain=lab6.com, AD Host DNS Domain=null, AD User NetBIOS Name=LAB6, AD Host NETBIOS Name=null, Calling
station id=00:0C:29:77:D6:85, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint
Profile=VMWare-Device, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/23, RADIUSAVPairs=[ Acct-SessionId=00000006], Posture Status=null, Posture Timestamp=, Session Last Update Time=Wed Mar 04 20:06:47 EST 2015
)
session (ip=10.0.0.51, Audit Session Id=0A0000020000000C00035232, User Name=68:EF:BD:F6:76:56, AD User DNS
Domain=null, AD Host DNS Domain=null, AD User NetBIOS Name=null, AD Host NETBIOS Name=null, Calling station
id=68:EF:BD:F6:76:56, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint Profile=CiscoDevice, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/15, RADIUSAVPairs=[ Acct-Session-Id=00000004], Posture
Status=null, Posture Timestamp=, Session Last Update Time=Wed Mar 04 21:18:38 EST 2015 )... ending at: Thu
Mar 05 01:32:40 EST 2015
--------------------------------------------------downloaded 2 sessions in 12 milliseconds
--------------------------------------------------connection closed
Johns-Macbook-Pro:bin jeppich$
Step 3
Verify that pxGrid services up and you see the ISE published nodes.
Administration->pxGrid Services
Step 4
Register a pxGrid client and download the active session records using the pxGrid register and
session_download shell scripts while the primary pxGrid node is down.
Cisco Systems © 2015
Page 55
SECURE ACCESS HOW-TO GUIDES
Johns-Macbook-Pro:bin jeppich$ ./register.sh -keystoreFilename mac.jks -keystorePassword cisco123 truststoreFilename caroot1.jks -truststorePassword cisco123 -hostname 10.0.0.49 -username mac_engineering20 group Session
------- properties ------version=1.0.0
hostnames=10.0.0.49
username=mac_engineering20
descriptipon=null
keystoreFilename=mac.jks
keystorePassword=cisco123
truststoreFilename=caroot1.jks
truststorePassword=cisco123
-------------------------registering...
connecting...
connected.
done registering.
connection closed
Johns-Macbook-Pro:bin jeppich$
Step 5
Verify that you can see registered pxGrid client, mac_engineering20
Administration->pxGrid Services
Returning Back to Primary
Returning back pxGrid primary node

application stop ise” on secondary pxGrid node
Cisco Systems © 2015
Page 56
SECURE ACCESS HOW-TO GUIDES

“application start ise” on primary pxGrid node

Download active sessions from MnT Primary node to compare sessions, they should be the same

Register pxGrid client to primary pxGrid node

View Registered pxGrid client in ISE

View Deployment node status to indicate pxGrid node status
Step 1
Verify that the primary pxGrid node is back up
Administration->System->Deployment, you should see all the nodes
Step 2
Verify the pxGrid services are running and you see the ISE published nodes
Administration->pxGrid Services
Step 3
Verify that you still have connection be downloading the active sessions by running session_download
Dddd
Cisco Systems © 2015
Page 57
SECURE ACCESS HOW-TO GUIDES
Johns-Macbook-Pro:bin jeppich$ ./session_download.sh -keystoreFilename mac.jks -keystorePassword cisco123 truststoreFilename caroot1.jks -truststorePassword cisco123 -hostname 10.0.0.48 10.0.0.49 -username
mac_engineering15
------- properties ------version=1.0.0
hostnames=10.0.0.48, 10.0.0.49
username=mac_engineering15
keystoreFilename=mac.jks
keystorePassword=cisco123
truststoreFilename=caroot1.jks
truststorePassword=cisco123
filter=null
start=null
end=null
-------------------------connecting...
connected.
starting at Thu Mar 05 01:57:14 EST 2015...
session (ip=10.0.0.17, Audit Session Id=0A0000020000000E027B9538, User Name=jeppich, AD User DNS
Domain=lab6.com, AD Host DNS Domain=null, AD User NetBIOS Name=LAB6, AD Host NETBIOS Name=null, Calling
station id=00:0C:29:77:D6:85, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint
Profile=VMWare-Device, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/23, RADIUSAVPairs=[ Acct-SessionId=00000006], Posture Status=null, Posture Timestamp=, Session Last Update Time=Wed Mar 04 20:06:47 EST 2015
)
session (ip=10.0.0.51, Audit Session Id=0A0000020000000C00035232, User Name=68:EF:BD:F6:76:56, AD User DNS
Domain=null, AD Host DNS Domain=null, AD User NetBIOS Name=null, AD Host NETBIOS Name=null, Calling station
id=68:EF:BD:F6:76:56, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint Profile=CiscoDevice, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/15, RADIUSAVPairs=[ Acct-Session-Id=00000004], Posture
Status=null, Posture Timestamp=, Session Last Update Time=Wed Mar 04 21:18:38 EST 2015 )... ending at: Thu
Mar 05 01:57:14 EST 2015
--------------------------------------------------downloaded 2 sessions in 12 milliseconds
--------------------------------------------------connection closed
Step 4
Register a pxGrid client to verify that all is working.
Johns-Macbook-Pro:bin jeppich$ ./register.sh -keystoreFilename mac.jks -keystorePassword cisco123 truststoreFilename caroot1.jks -truststorePassword cisco123 -hostname 10.0.0.48 10.0.0.49 -username
mac_engineering50 -group Session
------- properties ------version=1.0.0
hostnames=10.0.0.48, 10.0.0.49
username=mac_engineering50
descriptipon=null
keystoreFilename=mac.jks
keystorePassword=cisco123
truststoreFilename=caroot1.jks
truststorePassword=cisco123
-------------------------registering...
connecting...
connected.
done registering.
connection closed
Step 5
View pxGrid client, mac_engineering50, on the ISE pxGrid controller
Administration->pxGrid Services
Cisco Systems © 2015
Page 58
SECURE ACCESS HOW-TO GUIDES
Cisco Systems © 2015
Page 59
SECURE ACCESS HOW-TO GUIDES
ISE Self-Signed Identity Certificates
The ISE Self-Signed Identity certificate for pxGrid may be used when no external CA Authority is available and for
testing pxGrid and ISE implementations without using the sample certificate from the pxGrid SDK. By default the
self-signed Identity Certificate contains both an Enhanced Key Usage (EKU) of Server Authentication
(1.3.6.1.5.5.7.3.1) and Client Authentication (1.3.6.1.5.5.7.3.2) and is located in the ISE System Certificates store.
pxGrid clients may use self-signed certs, please see: Using Self-Signed Certificates with pxGrid ISE node and pxGrid
clients
pxGrid clients may also use CA-signed certs, please see: Using Self-Signed Certificates with pxGrid ISE node and
CA-signed pxGrid clients
Step 1
Enable pxGrid usage in the ISE Self-Signed Identity Certificate
Administration->System->Certificates->System Certificates->Edit the ISE self-signed certificate and select
pxGrid and then Save
Cisco Systems © 2015
Page 60
SECURE ACCESS HOW-TO GUIDES
Step 2
Export the public ISE Identity Self-Signed certificate under Trusted Certificates.
Administration->System->Certificates->Edit the self-signed certificate and “Export Certificate Only”
Note: This will be saved as a PEM file
Step 3
Import the PEM file into the Trusted Certificate Store
Cisco Systems © 2015
Page 61
SECURE ACCESS HOW-TO GUIDES
Administration->System->Certificates->Trusted Certificates->select PEM certificate and enable “Trust for
authentication within ISE”, then submit
Step 4
Enable pxGrid persona
Administration->System->Deployment->Edit deployment node and enable pxGrid, then Save
Step 5
Start the pxGrid Services
Administration->pxGrid Services
Cisco Systems © 2015
Page 62
SECURE ACCESS HOW-TO GUIDES
Note: If you see no connectivity to pxGrid node, this may take some time to come up.
Cisco Systems © 2015
Page 63
SECURE ACCESS HOW-TO GUIDES
Sample Certificates from SDK
In this example, we use sample certificates from the pxGrid SDK, that will be used for POC only, and not in
productional environments. Here we import rootSample.crt for the trusted CA certificate and import iseSample1.crt
and iseSample1.key, which will server as the public/private pair for the pxGrid client for client registration. For more
detailed information on a POC deployment, sample Certificates and pxGrid sample shell scripts, please see:
http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-84Configure_and_Test_Integration_with_Cisco_pxGrid.pdf
Step 1
Import rootSample.crt into the Trusted System Certificates of ISE
Administration->System->Certificates->Trusted Certificate->import the rootSample.crt, then Submit
Step 2
Import iseSample1.crt and iseSample1.key into the System Certificate store of ISE
Administration->System->Certificates->System Certificates->Import and use cisco123 for the password,
then submit.
Step 3
Enable pxGrid persona
Cisco Systems © 2015
Page 64
SECURE ACCESS HOW-TO GUIDES
Administration->System->Deployment->Edit deployment node and enable pxGrid, then Save
Step 4
Start the pxGrid Services
Administration->pxGrid Services
Note: If you see no connectivity to pxGrid node, this may take some time to come up.
Testing pxGrid Client
Make sure you export the ISE Self-Signed Identity Certificate from the MnT node, or in the case of a Stand-Alone
deployment to the pxGrid client for Bulk Session downloads (Please see Bulk Session Downloads).
Cisco Systems © 2015
Page 65
SECURE ACCESS HOW-TO GUIDES
Here we check for client registration and session downloads
Step 1
Use the register.sh script and run the following:
./register.sh -keystoreFilename iseSample1.jks -keystorePassword cisco123 -truststoreFilename rootSample.jks
-truststorePassword cisco123 -group Session -username iseSample -hostname 10.0.0.39 -group Session
------- properties ------version=1.0.0
hostnames=10.0.0.39
username=iseSample
descriptipon=null
keystoreFilename=iseSample1.jks
keystorePassword=cisco123
truststoreFilename=rootSample.jks
truststorePassword=cisco123
-------------------------registering...
connecting...
connected.
done registering.
connection closed
Verify that pxGrid client iseSample shows up as a registered client under pxGrid Services
Cisco Systems © 2015
Page 66
SECURE ACCESS HOW-TO GUIDES
References
How-to-Configure and Test pxGridhttp://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-84Configure_and_Test_Integration_with_Cisco_pxGrid.pdf
Using Self-Signed Certificates with pxGrid ISE node and pxGrid clients
Using Self-Signed Certificates with pxGrid ISE node and CA-signed pxGrid clients
Using CA-Signed Certificates with pxGrid ISE node and pxGrid clients
Cisco Systems © 2015
Page 67
SECURE ACCESS HOW-TO GUIDES
Appendices
Alternative way of generating pxGrid node Certificate Signing Request (CSR)
Here is an alternative of way of generating pxGrid node CSR requests. The primary PAN will generate the primary
pxGrid CSR request for the primary PAN and primary MNT nodes for pxGrid operation. The primary PAN will also
generate the secondary pxGrid CSR request for the secondary PAN and secondary MNT nodes for pxGrid activestandby configuration,
This section describes an alternative for exporting the public/private key pair from the primary pxGrid node and
importing into the Primary PAN and the Primary MnT node for pxGrid operation.
Step 1
Administration->System->Certificates->Generate Certificate Signing Request (CSR) for “pxGrid” usage
for both the Prinary PAN and the Primary MnT nodes.
Provide the Common Name (CN) and (DNS) values, then->Generate
Step 2
You will be prompted to download a csrs.zip file containing the CSR requests for the Primary PAN and
Primary MnT nodes
Step 3
Copy/Paste the Primary PAN request into the Advanced Certificate Request pxGrid template and download
the certificate
Step 4
Bind the certificate to the pan#1pxGrid node
Cisco Systems © 2015
Page 68
SECURE ACCESS HOW-TO GUIDES
Step 5
Copy/Paste the Primary MnT request into the Advanced Certificate Request pxGrid template and download
the certificate
Step 6
Bind the certificate to the MnT#1pxGrid node
Step 7
Administration->System->Certificates->Generate Certificate Signing Request (CSR) for “pxGrid” usage
for both the Secondary PAN and the Seondary MnT nodes.
Provide the Common Name (CN) and (DNS) values, then->Generate
Step 8
You will be prompted to download a csrs.zip file containing the CSR requests for the Seondary PAN and
Secondary MnT nodes
Step 9
Copy/Paste the Primary PAN request into the Advanced Certificate Request pxGrid template and download
the certificate
Step 10
Bind the certificate to the pan#2pxGrid node
Step 11
Copy/Paste the Secondary MnT request into the Advanced Certificate Request pxGrid template and
download the certificate
Step 12
Bind the certificate to the MnT#2pxGrid node
Cisco Systems © 2015
Page 69
SECURE ACCESS HOW-TO GUIDES
Troubleshooting
This section provides information on troubleshooting.
Make sure the pxGrid client, pxGrid nodes and ISE are DNS resolvable if you see the following error message:
jeppich$ ./session_download.sh -keystoreFilename mac.jks -keystorePassword cisco123 -truststoreFilename
caroot1.jks -truststorePassword cisco123 -hostname 10.0.0.48 10.0.0.49 -username mac
------- properties ------version=1.0.0
hostnames=10.0.0.48, 10.0.0.49
username=mac
keystoreFilename=mac.jks
keystorePassword=cisco123
truststoreFilename=caroot1.jks
truststorePassword=cisco123
filter=null
start=null
end=null
-------------------------connecting...
connected.
19:27:48.224 [main] WARN o.a.cxf.phase.PhaseInterceptorChain - Interceptor for
{https://mnt1.lab6.com/pxgrid/mnt/sd}WebClient has thrown exception, unwinding now
org.apache.cxf.interceptor.Fault: Could not send Message.
at
org.apache.cxf.interceptor.MessageSenderInterceptor$MessageSenderEndingInterceptor.handleMessage(MessageSende
rInterceptor.java:64) ~[cxf-api-2.7.3.jar:2.7.3]
at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:271) ~[cxf-api2.7.3.jar:2.7.3]
at org.apache.cxf.jaxrs.client.AbstractClient.doRunInterceptorChain(AbstractClient.java:581) [cxf-rtfrontend-jaxrs-2.7.3.jar:2.7.3]
at org.apache.cxf.jaxrs.client.WebClient.doChainedInvocation(WebClient.java:904) [cxf-rt-frontendjaxrs-2.7.3.jar:2.7.3]
at org.apache.cxf.jaxrs.client.WebClient.doInvoke(WebClient.java:772) [cxf-rt-frontend-jaxrs2.7.3.jar:2.7.3]
at org.apache.cxf.jaxrs.client.WebClient.doInvoke(WebClient.java:759) [cxf-rt-frontend-jaxrs2.7.3.jar:2.7.3]
at org.apache.cxf.jaxrs.client.WebClient.invoke(WebClient.java:355) [cxf-rt-frontend-jaxrs2.7.3.jar:2.7.3]
at org.apache.cxf.jaxrs.client.WebClient.post(WebClient.java:381) [cxf-rt-frontend-jaxrs2.7.3.jar:2.7.3]
at com.cisco.pxgrid.stub.identity.impl.SessionIteratorImpl.open(SessionIteratorImpl.java:128)
[pxgrid-identity-client-stub-1.0.0.jar:1.0.0]
at com.cisco.pxgrid.samples.ise.SessionDownload.main(SessionDownload.java:132) [pxgrid-sdk1.0.0.jar:1.0.0]
Removing Java and Installing JDK 8.0 on Centos 6.5
Delete Old version of Java
Step 1 Ensure Centos 6.5 is up-to-date, type: yum update
Cisco Systems © 2015
Page 70
SECURE ACCESS HOW-TO GUIDES
Note: you may need root privileges, type: su root yum update
Step 2 Once updates are completes, remove any other installed JAVA packages by typing:
rpm -qa | grep -E '^open[jre|jdk]|j[re|dk]'
Note: there was the java-1.6.0-openjdk-1.6.0.0-1.56.1.11.8.el6_3.i686 package already installed so I removed it by running)
Step 3 Type: yum remove java-1.6.0-openjdk
Install JDK 8.0
Step 1 Change to root user, type: su, you will be prompted for your password.
Step 2 Install JDK 8, type: rpm -Uvh jdk-8u20-linux-x64.rpm
Step 3 You will also need to run the alternatives commands:
alternatives --install /usr/bin/java java /usr/java/latest/jre/bin/java 200000
alternatives --install /usr/bin/javaws javaws /usr/java/latest/jre/bin/javaws 200000
alternatives --install /usr/lib64/mozilla/plugins/libjavaplugin.so libjavaplugin.so.x86_64
/usr/java/latest/jre/lib/amd64/libnpjp2.so 200000
alternatives --install /usr/bin/javac javac /usr/java/latest/bin/javac 200000
alternatives --install /usr/bin/jar jar /usr/java/latest/bin/jar 200000
java –version
Check java version, type: java –version, you should see: java version “1.8.0_20”
Cisco Systems © 2015
Page 71
Download